Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 17:09
Behavioral task
behavioral1
Sample
4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe
Resource
win10v2004-20240802-en
General
-
Target
4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe
-
Size
63KB
-
MD5
6034c6da161f6f738c65b125552c5700
-
SHA1
fbcf9e8ec5d7101f30c4231449124efdccb11200
-
SHA256
4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04
-
SHA512
78e00432994dff1258ce3338c3c867df89ac2eaae4d86e07c2df31152bc2117718313a74adeec678310cba161ae2d0337ef923e5a9c8125a48809fe26a2ff07e
-
SSDEEP
768:jSxam3Usjr3REXXr8yxFChMp7v9DLKrzCnbcuyD7UVeQI5no1cAvcV4RP0U+t6K:jRsjdEIUFC2p79OCnouy8VDqAG4RsfUK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1708 xk.exe 2636 IExplorer.exe 2808 WINLOGON.EXE 1736 CSRSS.EXE 1916 SERVICES.EXE 236 LSASS.EXE 1680 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mig2.scr 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File created C:\Windows\SysWOW64\shell.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File created C:\Windows\SysWOW64\Mig2.scr 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File created C:\Windows\SysWOW64\IExplorer.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000017403-8.dat upx behavioral1/files/0x000800000001748f-109.dat upx behavioral1/files/0x0005000000019271-112.dat upx behavioral1/memory/1708-115-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019277-128.dat upx behavioral1/memory/2636-127-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2808-137-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2372-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019382-138.dat upx behavioral1/memory/1736-151-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019389-148.dat upx behavioral1/memory/1916-161-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x00050000000193be-164.dat upx behavioral1/files/0x00050000000193c4-172.dat upx behavioral1/memory/236-171-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1680-183-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2372-184-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xk.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe File opened for modification C:\Windows\xk.exe 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 1708 xk.exe 2636 IExplorer.exe 2808 WINLOGON.EXE 1736 CSRSS.EXE 1916 SERVICES.EXE 236 LSASS.EXE 1680 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1708 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 30 PID 2372 wrote to memory of 1708 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 30 PID 2372 wrote to memory of 1708 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 30 PID 2372 wrote to memory of 1708 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 30 PID 2372 wrote to memory of 2636 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 31 PID 2372 wrote to memory of 2636 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 31 PID 2372 wrote to memory of 2636 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 31 PID 2372 wrote to memory of 2636 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 31 PID 2372 wrote to memory of 2808 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 32 PID 2372 wrote to memory of 2808 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 32 PID 2372 wrote to memory of 2808 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 32 PID 2372 wrote to memory of 2808 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 32 PID 2372 wrote to memory of 1736 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 33 PID 2372 wrote to memory of 1736 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 33 PID 2372 wrote to memory of 1736 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 33 PID 2372 wrote to memory of 1736 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 33 PID 2372 wrote to memory of 1916 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 34 PID 2372 wrote to memory of 1916 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 34 PID 2372 wrote to memory of 1916 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 34 PID 2372 wrote to memory of 1916 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 34 PID 2372 wrote to memory of 236 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 35 PID 2372 wrote to memory of 236 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 35 PID 2372 wrote to memory of 236 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 35 PID 2372 wrote to memory of 236 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 35 PID 2372 wrote to memory of 1680 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 36 PID 2372 wrote to memory of 1680 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 36 PID 2372 wrote to memory of 1680 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 36 PID 2372 wrote to memory of 1680 2372 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe 36 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe"C:\Users\Admin\AppData\Local\Temp\4ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2372 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:236
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD56034c6da161f6f738c65b125552c5700
SHA1fbcf9e8ec5d7101f30c4231449124efdccb11200
SHA2564ccff951e33a0013b5e6c71e0b9eedef2969c93ff299e559d2e56789bee4ed04
SHA51278e00432994dff1258ce3338c3c867df89ac2eaae4d86e07c2df31152bc2117718313a74adeec678310cba161ae2d0337ef923e5a9c8125a48809fe26a2ff07e
-
Filesize
63KB
MD501ba78a29beaac7c694c3c9dbc3a1c8d
SHA1bc71117f39f04cc723e25f1fad48ffa9ff539f71
SHA256b0caedf03d611e4d623bedeb30cb18d3a7396f136962f05cd63befab64003d4a
SHA51272208f2b12f7847ccc39117522de5df7d5890db46c1e09934ad16c38b6e01e5afbfd0822358480965e9828c20c47cf79979e65e622e5178573b18f813f8bac3d
-
Filesize
63KB
MD5e5db5ad776b0a91aa883c927b017e4e4
SHA17fac729d8df695259d0d22d1bacf1016daafa683
SHA2565a1ee5e6e40bd7fa4d83d60a519fe939e17b5d141a05467c1eef933b6d1c94e0
SHA512ae886dec9a97575d446ce3ac15eb9b4bda5a342822019ebb5af1e2ed1f350200ba481a1b8fb0ded5fab2a27b569f14c9986917e0c3bac85d79fa4a1ef17b5766
-
Filesize
63KB
MD5188899b29c6fc50ef0297f4e6d6a22c5
SHA12d24800af529e06af1cfbbad68793c3340971757
SHA2561458b6ae7d715b7f33ea9adef6bbe7201a6ec3db437ccc3f884868b81687bfe9
SHA512de98628ca45748c71324f95f974d31bf99993b2a85d12b7b36e92f3bc1c91db9d6d0007f7f2ae0b18da02dd152429c0275071e521802153c7cfedd1f8e11cfc4
-
Filesize
63KB
MD5186945723977c0ea23cc2561890b611c
SHA125333690b7b4ffee409e894a5e8eea8e67009be2
SHA256866122d6e95489da40c3a591ebd5746ed25319530e2731409e90c1c2ea1d1b3d
SHA5125e459065760fae512f56a35cba7e1555eb9727f7bbdddc0a79e434533e9b8c0d36d08dcde84271a3f487a8bac9e0b8001fbc4099139c29a71282f200694bce67
-
Filesize
63KB
MD55a95a2479e22c65979da6f51bbebc263
SHA14871afa8a5cc697e5469bff1693f4d876f7771db
SHA25654d9ceb17dc06e2f14be4f67dc384f769e4453980a05dca63b9ee55e38348092
SHA512afd9cf62b27b59193d3479e88e5b9c8ffb59453f9e6bdc18fcbfc8c6cfb06d08cba8ab138f726911ee048fa03031715454a135c45b19b10f48185c8dbe0cfdc7
-
Filesize
63KB
MD56318ee68959dd15450e161991a4c88a4
SHA10650f94ae6da77e586986bf58fcab67c91ffd80c
SHA256cf9039210fc8bf7d70612cb5127ad5a5ff3deffa75f687684ec50444350f9a7a
SHA51237c2c7e0dcd312ec9ef0e9c1b193fdd4af7243f5ff89afee5ea96e9e803b17f9b7107daefda29749e2ba4aecad50228b42fd69ffe250a7bab2117521d3e51195
-
Filesize
63KB
MD5bd899ca95d400d47283a50c234d4610e
SHA1dca47062cdbeac5d20306eff43e8edde5e4cea74
SHA2565407788b2c792917db000594c5761e24246347d18e8d603fff0bc1cf17154f2f
SHA51251de2d42ce18d7116e6c3b98d7ddf58bd6d3f241a9f22711fd966fb49debecd2cee09234e4de17e5bd58dbb39637be888c1073e9d9d084aa5eb1d8dcd32e0885